SEARCH KEYWORD -- Office Store



  IT System Cyber Attack Case Study 01: Malicious Macro and Backdoor Trojan Attack on IT-Network

Project Design Purpose: The objective of this cyber attack case study is to develop a workshop showcasing a practical demonstration of a red team attacker implementing an IT system/network attack via a Malicious Macro MS-Office-Word file (CVE-2015-1641) and phishing email generation program to penetrate multiple layers of firewall defenses and implant a backdoor trojan into the railway system's OT network. Related Links: GitHub Project Link , LinkedIn Post Link Attacker Vector: Malicious Macro ...

       2024-08-03 08:21:49

  Twitter service down incidents summary

This Thursday, Twitter encountered a global service down incident. This is the second service down incident since last month. Later Twitter updated its website and stated that users might not be able to access Twitter temporarily.Twitter admitted the service down incident and explained that this time's service down was caused by problems of their both data centers.Ok, now lets summarize the service down incidents encountered by Twitter in past few years.in May 2008, Twitter's new engineer team w...

   Twitter,Service down,History     2012-07-28 12:36:39

  Google launches Google Keep

According to Tencent Tech, Google announced the launch of Google Keep on Wednesday This is a note application similar to Evernote, its philosophy is to help you save everything you want to remember, including text and images and other notes, they can be instantly synchronized among different devices so that users can get the information they want at any time. This is a free service, it provides support for Web and Android 4.0 or later devices, users can navigate to Drive.Google.com/Keep or downl...

   Google Keep,Evernote,Synchronization     2013-03-21 13:00:02

  Which Type of IT Career is Best For You?

Considering the growth of the information technology job market, a career in IT is an incredibly smart career move.  A career in IT can mean many things – you can become a network administration, website developer, database specialist, programmer or engineer. The job range is vast and can suit various personalities and levels of technical skill. Having a good insight into those job profiles is key to make the right decision about your career path. Here's a selection of some of the mos...

   career,IT,tips     2014-07-30 09:21:40

  Binary tree iterator algorithm

Binary tree pre-order,in-order and post-order traversal are basics in algorithm and data structure.And the recursive binary tree traversal is a classical application of recursion. We define a binary tree node as : // C++ struct Node { int value; Node *left; Node *right; } In order binary tree traversal can be: // C++ void inorder_traverse(Node *node) { if (NULL != node->left) { inorder_traverse(node->left); } do_something(node); if (NULL != node->righ...

   Binary tree,Iterator,Traversal     2013-07-14 21:51:09

  Some thoughts about Facebook native app

On Techcrunch Disrupt last month, Facebook CEO Mark Zuckerberg's remarks about their mobile app sparked a denunciation against Web App. HTML 5 seems to have become the bottleneck of poor experience of all related mobile applications. From the user perspective, Facebook native iOS App rates from the 1.5 star to four star now; since the introduction of new native app, the user usage is doubled. It's not easy to have a huge rise of user usage for such a big app like Facebook. Especially consid...

   Facebook, Native app, Analysis     2012-10-12 20:38:11

  The iFOREX Trading App is First Class

If you have searched the web for trading application reviews, you are bound to hear terms like ‘state of the art’ and ‘lightning fast execution’. The real question you should ask is - Can you trust the broker who will facilitate your trading to provide you with a robust platform that has several tools that will allow you to successfully trade. You want to make sure that the platform is intuitive and does not take weeks to learn how to use.   The iFOREX trading platfo...

   APP,TRADING,IFOREX     2018-12-20 08:07:35

  When a CA becomes untrustable

Information security has become a vital part of people's life, especially for those people who spend much time online. Tons of data are being transmitted over the internet every second. These data include user ids, passwords, credit card information etc and some of them are sensitive information which needs secure way to transmit. Hence different protocols have been developed including SSL/TLS to encrypt data transmitted over the internet. The core of these security protocols is the certifi...

   APPLE,SECURITY,GOOGLE,MOZILLA,NEWS,WOSIGN     2016-10-01 23:03:44

  Those interaction methods we can play with

Smartphones have become one important part of our lives, the phone apps also play more and more important roles. They can help us live through the boring time or help us connect to our close friends fat away from us or help us get information,etc. There are also some interesting interaction methods since the birth of smartphones. We can play with them while we interact with the smartphones. Here we summarize some of them. 1. Shake Since WeChat introduces the Shake method to find people which yo...

   Interaction,Mobile device,Google glass     2013-05-07 05:21:15

  Building Security onto Your Mobile Application

Analysts state that more than 75% of the mobile applications will fail the basic security tests in 2015 – Gartner Research. Enterprises that follow the Bring Your Own Device (BYOD) approach and facilitate mobile computing to their employees are susceptible to security threats and other vulnerabilities, unless they implement stringent security measures. In the development or deployment of mobile applications, a business can be severely impacted both financially and otherwise, if they are to...

   Web Application Development Company, iPhone App Development Company     2015-08-21 07:22:32